Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

Detail

import type { Detail } from "https://googleapis.deno.dev/v1/containeranalysis:v1.ts";

A detail for a distro and package affected by this vulnerability and its associated fix (if one is available).

interface Detail {
affectedCpeUri?: string;
affectedPackage?: string;
affectedVersionEnd?: Version;
affectedVersionStart?: Version;
description?: string;
fixedCpeUri?: string;
fixedPackage?: string;
fixedVersion?: Version;
isObsolete?: boolean;
packageType?: string;
severityName?: string;
source?: string;
sourceUpdateTime?: Date;
vendor?: string;
}

§Properties

§
affectedCpeUri?: string
[src]

Required. The CPE URI this vulnerability affects.

§
affectedPackage?: string
[src]

Required. The package this vulnerability affects.

§
affectedVersionEnd?: Version
[src]

The version number at the end of an interval in which this vulnerability exists. A vulnerability can affect a package between version numbers that are disjoint sets of intervals (example: [1.0.0-1.1.0], [2.4.6-2.4.8] and [4.5.6-4.6.8]) each of which will be represented in its own Detail. If a specific affected version is provided by a vulnerability database, affected_version_start and affected_version_end will be the same in that Detail.

§
affectedVersionStart?: Version
[src]

The version number at the start of an interval in which this vulnerability exists. A vulnerability can affect a package between version numbers that are disjoint sets of intervals (example: [1.0.0-1.1.0], [2.4.6-2.4.8] and [4.5.6-4.6.8]) each of which will be represented in its own Detail. If a specific affected version is provided by a vulnerability database, affected_version_start and affected_version_end will be the same in that Detail.

§
description?: string
[src]

A vendor-specific description of this vulnerability.

§
fixedCpeUri?: string
[src]

The distro recommended CPE URI to update to that contains a fix for this vulnerability. It is possible for this to be different from the affected_cpe_uri.

§
fixedPackage?: string
[src]

The distro recommended package to update to that contains a fix for this vulnerability. It is possible for this to be different from the affected_package.

§
fixedVersion?: Version
[src]

The distro recommended version to update to that contains a fix for this vulnerability. Setting this to VersionKind.MAXIMUM means no such version is yet available.

§
isObsolete?: boolean
[src]

Whether this detail is obsolete. Occurrences are expected not to point to obsolete details.

§
packageType?: string
[src]

The type of package; whether native or non native (e.g., ruby gems, node.js packages, etc.).

§
severityName?: string
[src]

The distro assigned severity of this vulnerability.

§
source?: string
[src]

The source from which the information in this Detail was obtained.

§
sourceUpdateTime?: Date
[src]

The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.

§
vendor?: string
[src]

The name of the vendor of the product.